2017
DOI: 10.1155/2017/9423534
|View full text |Cite
|
Sign up to set email alerts
|

A Game Theory Based Approach for Power Efficient Vehicular Ad Hoc Networks

Abstract: Green communications are playing critical roles in vehicular ad hoc networks (VANETs), while the deployment of a power efficient VANET is quite challenging in practice. To add more greens into such kind of complicated and time-varying mobile network, we specifically investigate the throughput and transmission delay performances for real-time and delay sensitive services through a repeated game theoretic solution. This paper has employed Nash Equilibrium in the noncooperative game model and analyzes its efficie… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
7

Relationship

1
6

Authors

Journals

citations
Cited by 10 publications
(11 citation statements)
references
References 38 publications
(54 reference statements)
0
11
0
Order By: Relevance
“…The nonuniformity of the business distribution in the spatial dimension was considered, but these studies did not analyze the variability of the business distribution in the time dimension, although this feature will also significantly affect the network energy consumption [132], [135]- [137]. Hua et al investigated the throughput and transmission delay performances for realtime and delay sensitive services through a repeated game theoretic solution [199].…”
Section: ) Energy Efficiency Management Methodsmentioning
confidence: 99%
“…The nonuniformity of the business distribution in the spatial dimension was considered, but these studies did not analyze the variability of the business distribution in the time dimension, although this feature will also significantly affect the network energy consumption [132], [135]- [137]. Hua et al investigated the throughput and transmission delay performances for realtime and delay sensitive services through a repeated game theoretic solution [199].…”
Section: ) Energy Efficiency Management Methodsmentioning
confidence: 99%
“…In this subsection, NE is firstly given in Definition 1. Because the non-cooperative game can be easily defined by the formally structure, it has been widely used for solving the conflict problems resulted from restricted resources among selfish players in VNs, such as security protection [64], [65], privacy preserving [66], [67], trust management [139], [140], routing optimization [68]- [74], MAC access [75]- [78], power control [72], [73], [79], [80], in VEC [81]- [87], or HetNET [88], [89], or UAV networks [90], [91]. However, the non-cooperative game is characterized by a drawback of the absence of learning or interaction among players.…”
Section: Game Theoretical Modelsmentioning
confidence: 99%
“…• MAC access [75]- [78] • Ppower control [72], [73], [79], [80] • VEC [81]- [87] • HetNET [88], [89] • UAV networks [90], [ • Form clusters to detect or prevent misbehavior nodes [119]- [122] • Cluster-based routing [71], [123], [124] • Resource allocation or sharing [125]- [128] √ √ √ √…”
Section: Nementioning
confidence: 99%
See 1 more Smart Citation
“…Focus of the study Çeker et al [16] Modeled with a similar approach that uses game theory and provides the option of disguising a real system as a honeypot (or vice versa) to mitigate denial of service (DoS) attacks Hichem et al [17] Proposed a game theoretic technique to activate anomaly detection technique only when a new attack's signature is expected to occur Aaron et al [18] To increase the uncertainty of adversarial reconnaissance and introduced a novel game theoretic model of deceptive interactions between a defender and a cyber-attacker into responses to network scans or reconnaissance Somdip [19] Proposed a methodology in which game theory can be used to model the activity of stakeholders in the networks to detect anomalies such as collusion by using a supervised machine learning algorithm and algorithmic game theory Pawlick and Zhu [20] Investigated a model of signaling games in which the receiver can detect deception with a specified probability Kun et al [21] Employed Nash equilibrium in the noncooperative game model and analyzes its efficiency in vehicular ad hoc networks 3 Wireless Communications and Mobile Computing is the private information, which determined by the defensive action that is taken; the type of attacker Θ A = ðη j jj = 1, 2,⋯nÞ is the private information of the attacker, which is determined by the attack action that is taken.…”
Section: Authormentioning
confidence: 99%